期刊文献+

虚拟动态子群密钥管理方案 被引量:1

Virtual dynamic subgroup scheme
下载PDF
导出
摘要 简要介绍通常的群组密钥管理方案,提出虚拟动态子群的概念,并基于该虚拟动态群组提出一个适应于虚拟动态子群的密钥管理方案,该方案可借助原来大群的密钥信息对虚拟动态安全子群进行管理,与LKH(logical key hierarchy)方案相比减少了很多的数据传输和密钥存储空间。 Key management was usually mentioned in general static group. Based on virtual dynamic subgroup, VDSG (virtual dynamic subgroup scheme) was proposed. The virtual dynamic subgroup was managed by using the key information of the group. Compared with LKH, the average cost of re-keying and the number of keys held are reduced largely.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第5期731-734,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60373026)
关键词 群钥 虚拟群组 密钥管理 动态子群 动态安全 group key virtual group key management dynamic subgroup dynamic security
  • 相关文献

参考文献8

  • 1Foster I,Kesselman C,Tuecke S.The anatomy of the grid: Enabling scalable virtual organizations[J]. International J Supercomputer applications, 2001,15(3): 200-222.
  • 2Microsoft.Microsoft solutions framework(MSF)[EB/OL]. http://msdn.microsoft.com/vstudio/enterprise/msf/.
  • 3Wong C K, Gouda M G, Lam S S. Secure group communications using key graphs [C]. Proceedings of the ACM SIGCOMM'98 Conference on Applications, Technologies, Architectures, and-Protocols for Computer Communication, 1998.68-79.
  • 4李先贤,怀进鹏,刘旭东.群密钥分配的动态安全性及其方案[J].计算机学报,2002,25(4):337-345. 被引量:26
  • 5RFC 2627.Key management for multieast: Issues and architectures[S].
  • 6RFC 2094. Group key management protocol (GKMP) architecture[S].
  • 7Steiner M, Tsudik G, Waidrer M. CLIQUES: A new approach to group key agreement[A].IEEE International Conference on Distributed Computing System, Amsterdam [C], The Netherlands,1998.3:168-176.
  • 8Kim Y, Perrig A, Tsudik G. Tree-based group key agreement[J].ACM Transactions on Information and System Security (TISSEC), 2004, 7(1): 60-96.

二级参考文献13

  • 1[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 2[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 3[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 4[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 5[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 6[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 7[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 8[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934
  • 9[9]Ballardie T. Scalable Multicast Key Distribution. RFC 1949, 1996
  • 10[10]Dinsmore P T, Balenson D M, Heyman M et al. Policy-based security management for large dynamic groups: An overview of the DCCM project. In: Proc the DARPA Information Survivability Conference & Exposition, SC, USA, 2000. 64-73

共引文献25

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部